Monday, December 10, 2012

Internet
Group Management Protocol:- It allow internet host to participate in
multicasting. The IGMP messages are used to learn which hosts is part of which
multicast groups. T he mechanism also allow a host to inform its local router,
that it wants to receive messages.

2:- What are Ping and tracert?

Ping and
tracert are the commands used to send the information to some remote to
computer to receive some information. Information is sent and receives by
packets. Ping I Particularly used to check the system is in network or not. It
also gives packets lost information. In windows ping command is written as ping
ip_address tracert is called as trace route. It is track or traces the path the
packet takes from the computer where the command is given until the
destination. In windows ping command is written as tracert ip_address.

3:- Explain RSVP. How does it work?

Resource
reservation protocol is used to reserve resources across a network. It is used
for requesting a specific Quality of Services (QoS) from the network. This is
done by carrying the request (that need a reservation of the resource) of the
host throughout the network. It visits each node in the network. RSVP used two
local modules for reservation for resource. Admission control module confirms
if there are sufficient available resources while policy module checks for the
permission of making a reservation. RSVP offers scalability. On a successful
completion of both checks RSVP used the packet classifier and packet scheduler
for the desired Qos requested.

4:- Explain the concept of DHCP.

Dynamic Host Configuration Protocol is
used assigning IP addresses to computers in a network. The IP addresses are
assigned dynamically. Certainly, using DHCP, the computer will have a different
IP address

Every time it is connected to the
network. In some cases the IP address may change even when the computer is in
network. The mean that DHCP leases out the IP address to the computer for some
time. Clear advantage of DHCP is that
the software can be used to manage IP address rather than the administrator.

5:- What are the difference between a Domain and a WrokGroup?

In a Domain, one or more computer can
be server to manage a network. On the other hand in a workgroup all computers
are peer having no control on each other. In a Domain, User does not need a account
to logon a specific computer if an account is available on the domain. In a
workgroup user need to have account to logon every computer. In a domain
Computer can be on different network. In a workgroup all computer need to be
part of same network.

6:- Explain how NAT work?

Network address translation translates
an IP address used in a network to another IP address knows within another
network. A NAT table is maintained for global to local and local to mapping of
IP, s. NAT can be statically defined or dynamically translate from a pool of
addresses. The NAT router is responsible for translating traffic coming and
leaving the network. NAT prevent Malicious actively initiated by outside host
from reaching local hosts by being dependent on a machine on the local network
to initiate any connection to host on the other side of router.

7:- What is PPP Protocol? Explain PPP packet formet.

Point to Point protocol help to communication
two computers with each other over a serial cable, phone line, or other fiber optic lines. E.g. Connection an
internet services provider and a host. PPP also provide authentication. PPP
operates by sending request packet and waiting for acknowledge packet that
accepts, reject or try to change the request. The protocol is also use to
negotiate on network address or compression option between the nodes.

Protocol field:-1 or 2 byte:-setting
of protocol in information field of (datagram)

Information:- o or more byte

8:-What is IP spoofing and how can it be prevented?

IP spoofing is a mechanism used by
attacker to gain unauthorized access to a system here the intruder sends
message to a computer with IP address indicating that the message is coming
from a trusted host. This is done by forging the header soit contain a different address and make it
appear that the packet was sent by a different machine.

Prevention:-

Packet Filtering: - to allow packet
with recognized formats to enter the network using special router and firewalls.
Encrypting the session.

9:-Explain IP Datagram, Fragmentation and MTU.

IP datagram can be used to describe a
portion of IP data. Each IP datagram has set of field arrange in a order. The
order is a specific which help to decode and read the stream easily. IP
datagram has like version, Header length, Type of service, Total length,
checksum, flag , Protocol, time of live , identification, Source and
destination IP address, padding, option and payload.

MTU- Maximum transmission unit uses
the size of larger packet that a communication protocol can pass the size can
be fixed by some standard or decided at the time of connection.

Fragmentation is a process to break IP
packets in small pieces. Fragmentation is needed when the datagram is larger
than the MTU. Each fragment comes in a datagram in itself and transmitted
independently from source. When received by destination they are reassembled.

10:- What is an application gateway?

An application gateway is a program
that runs on firewall between to network. An application gateway is used to
establishing connection between client program and destination services. The
client negotiates with the gateway to communication with the services of
destination. Here gateway can be called a proxy other between proxy and
destination service. Connection takes palace behind the firewall.

11:- Explain the circuit level gateway?

A circuit level gateway is used to
find if a session in TCP handshaking is legitimate or not. It can be considered
as a layer between application layer and transport layer. They protect the
information of private network their protect. Circuit level gateway does not filter
packets.

12:-What is the”gateway of last resort”?

A gateway of last resort or default
gateway is a route used by a router when other know route exist to transmit the
IP packets. Know routes are present in routing table. Hence any route not known
by the routing table is forwarded to the default route. Each router which
receive the packet will treat the packet same way. If the route is known,
packet will be forwarded to the known route

13:-What is LAN?

LAN is a computer network that spans
relatively a small area. Most LAN are connected with a building or group of
buildings. However a LAN can be connected with other LAN over any distance via
telephone line or radio waves. A system of LAN connected via this process is
called WAN. Most LAN,sconnect
workstation and personal computer. Each Node in LAN have it own CPU with which
execute program but it is usable to access data from anywhere on the LAN. This
means any user in network can share device, data. LAN can be also use to
communicate with each other by sending email, or chatting.

14:-How would you Enable or
Disable the Firewall in Windows XP?

1. Click Start; click Run, type Firewall.cpl,
and then click OK.

2. On the General tab, click on (recommended).

3. Click OK.

15:- How would you Start or Stop a Windows Service?

To open Services, click Start, click Control Panel,
click Performance and

tools with the operating
system that perform everyday administrative tasks that users need to

accomplish. These are part
of the All Users profile of the computer and
located in the

Administrative Tools group on the Startup menu. Saved as MMC console (.msc) files,
these

custom tools can be sent by
e-mail, shared in a network folder, or posted on the Web. They can

also be assigned to users,
groups, or computers with system policy settings. A tool can be scaled

up and down, integrated
seamlessly into the operating system, repackaged, and customized.

92:-What is gpedit.msc?

Group Policy is a feature of the Microsoft Windows NT
family of operating

systems. Group Policy is a
set of rules that control the working environment of user accounts and

computer accounts. Group
Policy provides the centralized management and configuration of

operating systems,
applications, and users' settings in an Active Directory environment.
In other

words, Group Policy in part
controls what users can and cannot do on a computer system.

Although Group Policy is
more often seen in use for enterprise environments, it is also common

in schools, smaller
businesses, and other kinds of smaller organizations. Group Policy is often

used to restrict certain
actions that may pose potential security risks, for example: to block access

to the Task Manager,
restrict access to certain folders, disable the downloading of executable

files, and so on.

93:- How would you use the MMC to manage other servers on your

network?

Using three custom created
MMC consoles, I can manage all aspects of my

network -- locally or
remotely (via the VPN).

The first is my
"Domain Console", where I add snap-ins for AD controllers (sites,
users, etc), as

well as all of the other
servers. This allows me to manage DFS, Exchange, events and shares all

in one place without
opening a new console for each server.

My second console is the
"Computer Console". As I get support calls about our Win2k

machines, I add the
computer of the client I am speaking with to this console. This way, I can

manage all aspects of that
machine in the computer management snap-in. It also helps me keep

an eye on new shares the
user is adding to their machine.

My third console is my
"Remote Connect Console". In this console, there are only snap-ins

related to remote connectivity.
For my convenience, I also add the computer management snap in

for the servers involved in
remote connectivity.

These three consoles are
invaluable to me. It seems almost too obvious to use these, but I have

encountered several admins
that use the default MMC console and spend a lot of time connecting

to resources to manage
them. I hope this tip helps you as much as it has helped me.

94:- What new in the Windows Vista Local Policy?

Windows Vista delivers a
substantial update to the Group Policy infrastructure.

Yet as organizations around
the world deploy Windows Vista, many administrators probably

won't notice much of a
difference in how they work because the numerous changes in Group

Policy functions

all take place under the
hood. What administrators will find, however, is that Windows Vista􀂌

Group Policy is much more
powerful than it was in previous versions.

Prior to Windows Vista,
Group Policy processing occurred within a process called win logon.

Win logon had a lot of
responsibility, which included getting people logged on to their desktops,

as well as servicing the
various Group Policy chores. Group Policy is now its own Windows®

service. What's more, it's
hardened, which means that it cannot be stopped nor can an

administrator take
ownership of the permissions upon Group Policy in order to then turn it off.

These changes enhance the
overall reliability of the Group Policy engine.

95:- What is the difference between User Privileges and User

Permissions?

User rights generally refer
to logon capabilities: who can logon interactively, as a

batch job, as a service,
over the network, over Terminal Services, etc. These all require a certain

"right" and these
rights can also be denied to groups or individual users.

Permissions relate to the
capability of accessing an object, such as a file, a registry entry, a

service, a printer, a
share, etc. Again these can be granted or denied but there is more granularity

here as there are several
permission types: read, write, delete, etc. Permissions are collected into

Access Control Lists (ACLs)
with each entry being termed an Access Control Entry (ACE) .

To complete the trio in
common parlance, there are privileges. These relate to overriding

capabilities within Windows
such as backup, restore, take ownership, debug, etc. If you hold the

backup privilege, for
example, you are allowed to read all files, regardless of permissions on

those files. Privileges
trump permissions.

Confusingly, privileges are
sometimes referred to as rights, even in official MS documentation.

in the days of NT4, some
were also called "abilities" so you'll note the careful use of the
generic

term,
"capability" above.

96:- What is Safe Mode?

A specific way for the
Windows operating system to load when there is a system critical

problem interfering with
the normal operation of Windows. Safe mode allows the user to

troubleshoot the operating
system to determine what is not functioning properly. Safe mode is a

troubleshooting option for
Windows that starts your computer in a limited state. Only the basic

files and drivers necessary
to run Windows are started. The words "Safe Mode" appear in the

corners of the display to
identify which Windows mode you are using. If an existing problem

does not reappear when you
start in safe mode, you can eliminate the default settings and basic

device drivers as possible
causes.

97:- Which logs can be found in Event Viewer?

Event Viewer, a component of Microsoft's Windows NT line
of operating systems,

lets administrators and
users view the event logs on a local or remote machine. The Event Log

Service records
application, security, and system events in Event Viewer. With the event logs
in

Event Viewer, you can
obtain information about your hardware, software, and system

Components, and monitor
security events on a local or remote computer. Event logs can help you

Identify and diagnose the
source of current system problems, or help you predict potential system

Problems.

98:- Can you upgrade XP Home Edition to Server 2003?

Answer84-
No

99:-What is the difference between Intranet
and internet?

There
is one major distinction between an intranet and internet. The Internet is an
open public space, while an intranet is designed for private space. An Intranet
may be access by a internet, but as a rule it is protected by a password and
accessible only to employees or other authorized users. From within a company
an intranet server may respond much more quickly than a typical website. This
is because the public internet is at the mercy of traffic spikes server breakdown
and other problems that may slow the network. Within a company user have much
more bandwidth and network hardware may be more reliable.This make it easier to server high bandwidth
content, such as audio and video, over and internet.

100:- Define the term of protocol?

Protocol
is a standard way to communication across a network. A protocol is the
“language” of the network. It is method by which two dissimilar systems can
communicate. TCP-IP is protocol which runs on network Layer.

101:-Define the file transfer protocol?

File transfer protocol is a standard
internet protocol, is the simplest way to exchange file between computers on
the internet. Like Hyper text transfer protocol (HTTP), which transfer
displayable web pages and related files, and the simple mail transfer protocol
(SMTP), which transfer E-mails? FTP is an application protocol that uses the
internet’s TCP/IP protocols.FTP is commonly transfer web page file from the
other creator onthe other computer that
act as a server for everyone on the internet. It is also commonly use to
download programs and other files to your computer from other server.

102:-Explain the 7 Layer of OSI model?

If you found solution then you can follow me and send me your Suggestion on Satishrana93@gmail.com